KVSoftKey
The need for efficiency and the will to overcome impediments caused by time and space have brought about technological breakthrough in AIoT, peripheral computing and virtual machine deployment, which contribute to IT network expansion around the globe.
As individuals are closely connected than ever, the growing number of endpoints require stronger foundations of trust, secure communication, identification, and authentication.
KVSoftKey features a hardware root of trust that is generated via SRAM PUF (Physically Unclonable Function) technology. It provides eclectic cryptographic services reducing customers’ costs and efforts, allowing customers to deploy endpoint security without tedious configuration.
From intellectual property protection, digital rights management, IoT, communication, payments, to automobile, KVSoftKey ushers in an era of revolutionary security mechanisms, meeting requirements for time-to-market and cost-efficient mass production.
As individuals are closely connected than ever, the growing number of endpoints require stronger foundations of trust, secure communication, identification, and authentication.
KVSoftKey features a hardware root of trust that is generated via SRAM PUF (Physically Unclonable Function) technology. It provides eclectic cryptographic services reducing customers’ costs and efforts, allowing customers to deploy endpoint security without tedious configuration.
From intellectual property protection, digital rights management, IoT, communication, payments, to automobile, KVSoftKey ushers in an era of revolutionary security mechanisms, meeting requirements for time-to-market and cost-efficient mass production.
Key Features
For systems or devices integrated with a secure element, KVSoftKey is “the last mile” to a holistic security solution building system-level defense.KVSoftKey features Physically Unclonable Function (PUF), seamlessly incorporating every single component as a whole. PUF relies on the innate characteristics of the semiconductors to generate a root key that resembles a “fingerprint”, which is unique and unpredictable.
Using the root key to establish a secure channel with the existent secure element for subsequent key derivation and wrapping is trustworthy as it vanishes without trace right after tasks are done.
Compared with MCU TrustZone, in which a root key goes though the preload phase and gets stored in an isolated zone, PUF gets a head start with an innate root key dwelling by no means in memory, eradicating the threats of key extraction and data breaches.
Leverage PUF and IKV-Tech Expertise
For systems or devices integrated with a secure element, KVSoftKey is “the last mile” to a holistic security solution building system-level defense.KVSoftKey features Physically Unclonable Function (PUF), seamlessly incorporating every single component as a whole. PUF relies on the innate characteristics of the semiconductors to generate a root key that resembles a “fingerprint”, which is unique and unpredictable.
Using the root key to establish a secure channel with the existent secure element for subsequent key derivation and wrapping is trustworthy as it vanishes without trace right after tasks are done.
Compared with MCU TrustZone, in which a root key goes though the preload phase and gets stored in an isolated zone, PUF gets a head start with an innate root key dwelling by no means in memory, eradicating the threats of key extraction and data breaches.
Competenece
I. Raising software-based security to hardware levelWhether it is data in transit or at rest, keys are by no means stored in memory, which allows the security of KVSoftKey mechanism to equal the one of a secure element, in which keys are protected by hardware.
II. Heightening hardware-based security with secure channelsKVSoftKey can create synergy and fulfill system-level protection with secure elements. To establish a secure channel between a microcontroller and a secure element, the root of trust used to access the secure element is generated via PUF. Once the task is done, the root of trust will be erased, which ensures sensitive key materials are securely handled and minimizes the possibility of exposure.